Sections

Bouncers
Connection
Test
DCC
Exploits
Files
Needed
Flooders
Hanson
Programs
ICMP
Programs
ICQ
Programs
Link
Lookers
Mail Programs
Misc Programs
Multi
Programs
Nukers
OOB
Programs
Patches
Port Bombers
Port
Listeners
Port Scanners
Source
Code
Spoofers
UDP Programs
Wingate
Programs
Misc

[email protected] |
|
Description

D.O.S. attacks do exactly
as the name implies. They deny service to users (stop people from being able
to use certain services on the internet) or they stop users from getting
on the internet at all........
Bouncers
- These programs will let you connect to IRC through a friends IP. Very usefull
if you've been k-lined.........
Connection Test
- These programs test the lag between two computers........
DCC Exploits
- These programs exploit the dcc command in mIRC...........
Files Needed
- These programs contain many files that maybe needed to run certain programs.
If the program requires a certain file, the program will error and tell you
that a certain file is missing. Download the file here and run the install
program, unzip it to the dir where the program is, or unzip it to your
windows/system dir........
Flooders
- These programs contain files that are used to flood someone, usually on
IRC. They will flood the user, try and nick collide the person, and many
other things. Basically they are just real annoying...........
Hanson Programs
- These programs exploit a bug in mIRC 5.3*.
ICMP Programs
- The ICMP Programs section contains files that are used to test the lag
between two computers. Well sort of. These programs will lag the fuck out
of someone's connection that they will get disconnected........
ICQ Programs
- These programs affect ICQ in many ways by spoofing UIN numbers, bombing
the shit out of a UIN number, or by killing ICQ.
Link Lookers
- The Link Lookers section contains files that find out when two servers
split from each other while chatting. These programs can also be used along
with the other programs to take over channels on IRC........
Mail Programs
- The Mail Programs section contains files that are used to anon e-mail someone,
to clean up your mail box when you have been mail bombed, and also the mail
bombers.......
Misc Programs
- The Misc Programs section contains files that really don't have a section
to belong to. Many of these programs are worth checking out though.
Multi Programs
- The Multi Programs section contains files that contain more than one type
of D.O.S. attack. Very handy when all of the programs that you need are within
one user interface........
Nukers
- The Nukers section contains files that are used to kill someone connection.
These programs are most commonly used on IRC. They try and disconnect the
user from the port that they are connected to on the IRC server.......
OOB Programs
- These programs affect clients by sending an "Out Of Band" eception message
to an ips ports. This program usually causes windows to error (Blue Screen
Error).
Patches
- These programs help you to protect your system from certain types of attacks
or are used to update some of the software on your computer. Install each
patch that is required making sure that you reboot your computer between
each patch you install.......
Port Bombers
- These programs flood/bomb an open port sometimes causing lag to the ip
you are doing this to. They can also be used to take up all of the ips resources,
which will then cause the port to close and the connection to terminate.
Please note that the killing of an ip by using a port bomber is very
rare..........
Port Listeners
- These programs keep watch over ports on your system to help protect you
against many denial of service attacks. If the program detects a connection
to a port from an ip, it will warn you and log the attack. These logs can
then be turned over to your isp (Internet Service Provider). Your isp will
then contact the attackers isp and action will be taken.
Port Scanners
- These programs scan ips for open ports. The information collected from
these programs can be used to cause damage or to tell you what ports on your
computer that need to be secured. Many denial of service attacks require
the ip to have an open port and these programs will help you in determining
if the port is open.
Source Code
- In this section, you will find source code for many different denial of
service attacks. Use these to learn how certain attacks work and also learn
how to write your own programs. You will find source code for almost every
major compiler.........
Spoofers
- The Spoofers section contains files that are used to spoof your ip number
or ident number. There are also some programs that will create "ghost"
connections with fake ips.......
Udp Programs
- The UDP Programs section contains files that can lag a persons
connection........
Wingate Programs
- The Wingate Programs section contains files that will exploit wingate
servers..........
Hexing Programs
Virus Programs
Firewall Programs
Password Generators
Virus
Engines
|
|
|